Documentation should describe protection against repository corruption

Bug #445428 reported by Kevin Smith
8
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Bazaar
Confirmed
Low
Unassigned
Breezy
Triaged
Low
Unassigned

Bug Description

I am evaluating bzr for use with a project that has fairly high security requirements. The online documentation does not describe whether or how the SHA1 digests would allow us to detect attacker attempts to modify the repository directly. I'm not worried about hash collisions...I'm willing to assume that if they change something the SHA1 will no longer match.

Would an attacker be modifying files, or commits (or both)? What bzr commands would detect that? status? update? check? commit? If someone changed a non-trunk branch, would normal day-to-day operations on trunk detect that damage that was "off to the side?"

In a perfect world, the documentation would include a point-by-point response to: http://www.dwheeler.com/essays/scm-security.html

I'm creating a separate issue to request documentation of the gpg signing features.

Revision history for this message
Martin Pool (mbp) wrote :

It would be good to document this more fully.

Fetching from one repository to another (pull, push, merge) will (modulo bugs, as always) detect inconsistent data. status only works in the working tree and will not check that the history is consistent.

Changed in bzr:
importance: Undecided → Low
status: New → Confirmed
Jelmer Vernooij (jelmer)
tags: added: check-for-breezy
Jelmer Vernooij (jelmer)
tags: added: documentation
removed: check-for-breezy
Changed in brz:
status: New → Triaged
importance: Undecided → Low
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.